Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 292 matches
- 2023
- Satish Kumar, Indivar Gupta, Ashok Ji Gupta:
A study of public key cryptosystems based on quasigroups. Cryptologia 47(6): 511-540 (2023) - Haodong Jiang, Jiang Han, Zhenfeng Zhang, Zhi Ma, Hong Wang:
Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems. IEEE Trans. Inf. Forensics Secur. 18: 5069-5081 (2023) - Seung-Rae Kim, Richard Kyung:
Study on Modified Public Key Cryptosystem Based on ElGamal and Cramer-Shoup Cryptosystems. CCWC 2023: 280-284 - Mohammad Ahmad Alia, Yousef Jaradat, Abdul Razzak Alshehadeh:
Key Analysis of Integer Factorizing based Public-Key Cryptosystems Using Machine Learning. ICAAI 2023: 1-5 - Jacques Peyriére, Fengxia Liu, Zhiyong Zheng, Zixian Gong:
Public key cryptosystems based on Iterated Functions Systems. CoRR abs/2309.05917 (2023) - Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. IACR Cryptol. ePrint Arch. 2023: 419 (2023) - Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 456 (2023) - George Teseleanu, Paul Cotan:
Small Private Key Attack Against a Family of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 1356 (2023) - 2022
- Selda Çalkavur:
Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes. Entropy 24(4): 498 (2022) - Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. ProvSec 2022: 88-104 - 2021
- Shailendra Kumar Tripathi, Bhupendra Gupta, K. K. Soundra Pandian:
An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems. Expert Syst. Appl. 164: 114047 (2021) - Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. Public Key Cryptography (1) 2021: 659-690 - Koji Nuida:
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic. Public Key Cryptography (2) 2021: 441-468 - Paulo José Fernandes Almeida, Miguel Beltrá, Diego Napp, Cláudia Sebastião:
Smaller Keys for Code-Based Cryptography: McEliece Cryptosystems with Convolutional Encoders. CoRR abs/2104.06809 (2021) - Zhiyong Zheng, Wenlin Huang, Jie Xu, Kun Tian:
A Generalization of Cyclic Code and Applications to Public Key Cryptosystems. CoRR abs/2112.14115 (2021) - Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao:
Public-key Cryptosystems and Signature Schemes from p-adic Lattices. IACR Cryptol. ePrint Arch. 2021: 522 (2021) - Daniel Nager, Danny Niu Jianfang:
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups. IACR Cryptol. ePrint Arch. 2021: 444 (2021) - 2020
- Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt:
Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security 80, Springer 2020, ISBN 978-1-0716-0985-9, pp. 1-248 - Daisaburo Yoshioka:
Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over $\mathbb Z/p{k}\mathbb Z$. IEEE Trans. Circuits Syst. II Express Briefs 67-II(10): 2204-2208 (2020) - Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. CRYPTO (1) 2020: 63-93 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020) - Pedro Hecht:
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings. IACR Cryptol. ePrint Arch. 2020: 1102 (2020) - 2019
- Patrick Felke:
On the security of biquadratic C ∗ public-key cryptosystems and its generalizations. Cryptogr. Commun. 11(3): 427-442 (2019) - Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2019: 370 (2019) - 2018
- Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. Des. Codes Cryptogr. 86(8): 1623-1683 (2018) - Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung, Brahim Hamadicharef:
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs. J. Parallel Distributed Comput. 119: 179-190 (2018) - Paolo Santini, Marco Baldi, Franco Chiaraluce:
Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes. CANS 2018: 323-343 - Daisaburo Yoshioka:
Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over the Residue Ring Z/pkZ. GLOBECOM 2018: 1-4 - Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. ICICS 2018: 767-777
skipping 262 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 13:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint